Global law firm Jones Day announced on April 7, 2026, that it had suffered a cyberattack originating from a phishing campaign. The firm stated that an unauthorized third party gained access to a limited number of files related to 10 clients. Responsibility for the attack has been claimed by the Silent Ransom Group (SRG), a threat actor also known as Luna Moth and considered a descendant of the Conti ransomware syndicate. The group has reportedly demanded a US$13 million ransom and has begun leaking supposed negotiation chats to apply pressure, underscoring the high-value targeting of legal firms and their sensitive client data.
This incident is a targeted data theft and extortion attack, not a traditional ransomware deployment where files are encrypted. The Silent Ransom Group, also tracked as Luna Moth, Chatty Spider, and UNC3753, specializes in data theft for extortion without the encryption component. This makes the attack faster and stealthier, as it avoids the noisy process of file encryption that often triggers security alerts.
The attack on Jones Day began with a successful phishing attack, which likely provided the initial foothold. Following the data exfiltration, SRG engaged in double extortion tactics:
The FBI has previously warned that this group has been systematically targeting U.S.-based law firms since 2023, recognizing them as repositories of highly sensitive and valuable information.
The attack chain highlights the group's sophistication and focus on social engineering.
T1566 - Phishing. This could have been a simple link to a credential harvesting page or a malicious attachment that installed a backdoor.T1020 - Automated Exfiltration or T1537 - Transfer Data to Cloud Account, where data is moved to attacker-controlled cloud storage.T1485 - Data Destruction (in the sense of destroying confidentiality).Some reports on SRG's broader TTPs mention a unique tactic involving social engineering calls followed by an operative visiting the victim's office in person, posing as IT support to physically plug in a device and steal data. It is not confirmed if this tactic was used against Jones Day.
The impact on a law firm like Jones Day is multi-faceted and severe, even if only a limited number of files were accessed:
No specific technical Indicators of Compromise (IOCs) have been publicly released.
Detecting data theft without encryption is challenging and requires a focus on data movement and user behavior.
D3FEND Reference: Key detection techniques are D3-UDTA - User Data Transfer Analysis to spot anomalous data egress and D3-RAPA - Resource Access Pattern Analysis to detect unusual file access patterns.
Mitigating this threat requires a combination of technical controls and security awareness.
M1032 - Multi-factor Authentication.M1017 - User Training.D3FEND Reference: Implementing D3-MFA - Multi-factor Authentication is the most impactful countermeasure against the initial access vector.
Enforce MFA, especially phishing-resistant MFA like FIDO2, on all external-facing services and critical internal systems to prevent account takeovers from stolen credentials.
Mapped D3FEND Techniques:
Conduct regular, practical security awareness training to help employees identify and report sophisticated phishing and social engineering attempts.
The attack on Jones Day began with phishing, a tactic designed to steal credentials. The single most effective countermeasure against this initial access vector is Multi-factor Authentication, particularly phishing-resistant forms like FIDO2/WebAuthn security keys. By requiring a physical token for authentication, attackers cannot gain access even if they successfully trick an employee into revealing their password. For a high-value target like a global law firm, deploying phishing-resistant MFA on all critical systems—especially email, VPN, and the document management system—is a foundational and non-negotiable security control. This moves the security posture from relying on fallible human behavior (not clicking the link) to relying on a strong technical control (possession of the security key).
Since the Silent Ransom Group focuses on data theft rather than encryption, detecting the attack requires focusing on data movement. User Data Transfer Analysis is a critical D3FEND technique for this purpose. Security teams should deploy tools (like CASB, DLP, or NDR) to monitor and baseline the volume and type of data transferred by each user. An alert should be triggered if a user account suddenly begins exfiltrating an unusually large volume of data, especially to an external destination like a personal cloud storage account or an unknown IP address. For Jones Day, this would mean flagging an employee account that suddenly downloads terabytes of client files and uploads them to an external service. This provides a crucial opportunity to detect and stop a data breach in progress, before the extortion phase even begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats